HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 3.41 Improper use of remote access services

T 3.41 Improper use of remote access services

Unless users receive appropriate training it is possible, as with every other IT system, for security problems to develop as a result of users' (usually unintentional) mistaken actions while using RAS or in the environment in which RAS is used (e.g. violation of IT security guidelines or incorrect configuration).

Moreover, stationary and mobile IT systems on which RAS client software is installed are often used not just to access a LAN. In particular, if the RAS connection is established over the Internet, then often Web and e-mail services are used over these IT systems. In many cases external networks are accessed, for example, when employees working in the field log on to customer networks using mobile RAS clients. This can result in exposure to the threats described below.

Examples


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home